Professional Documents
Culture Documents
Sensors: Positioning Information Privacy in Intelligent Transportation Systems: An Overview and Future Perspective
Sensors: Positioning Information Privacy in Intelligent Transportation Systems: An Overview and Future Perspective
Article
Positioning Information Privacy in
Intelligent Transportation Systems:
An Overview and Future Perspective †
Aleksandr Ometov 1, * , Sergey Bezzateev 2 , Vadim Davydov 3 , Anna Shchesniak 3 ,
Pavel Masek 4 , Elena Simona Lohan 1 and Yevgeni Koucheryavy 1
1 Tampere University, 33720 Tampere, Finland; elena-simona.lohan@tuni.fi (E.S.L.); yk@cs.tut.fi (Y.K.)
2 Saint-Petersburg State University of Aerospace Instrumentation (SUAI), St. Petersburg 190000, Russia;
bsv@aanet.ru
3 ITMO University, St. Petersburg 191002, Russia; vadim.davydov@niuitmo.ru (V.D.);
anna.schesnyak@scaegroup.com (A.S.)
4 Brno University of Technology, 60190 Brno, Czech Republic; masekpavel@vutbr.cz
* Correspondence: aleksandr.ometov@tuni.fi
† This paper is an expanded version of the conference paper: Davydov, V; Bezzateev, S. Secure Information
Exchange in Defining the Location of the Vehicle. In Proceedings of the 41st IEEE International Conference
on Telecommunications and Signal Processing (TSP), Athens, Greece, 4–6 July 2018.
Received: 25 February 2019; Accepted: 26 March 2019; Published: 3 April 2019
Abstract: Today, the Intelligent Transportation Systems (ITS) are already in deep integration phase
all over the world. One of the most significant enablers for ITS are vehicle positioning and tracking
techniques. Worldwide integration of ITS employing Dedicated Short Range Communications (DSRC)
and European standard for vehicular communication, known as ETSI ITS-G5, brings a variety of
options to improve the positioning in areas where GPS connectivity is lacking precision. Utilization
of the ready infrastructure, next-generation cellular 5G networks, and surrounding electronic devices
together with conventional positioning techniques could become the solution to improve the overall
ITS operation in vehicle-to-everything (V2X) communication scenario. Nonetheless, effective and
secure communication protocols between the vehicle and roadside units should be both analyzed
and improved in terms of potential attacks on the transmitted positioning-related data. In particular,
said information might be misused or stolen at the infrastructure side conventionally assumed to be
trusted. In this paper, we first survey different methods of vehicle positioning, which is followed by
an overview of potential attacks on ITS systems. Next, we propose potential improvements allowing
mutual authentication between the vehicle and infrastructure aiming at improving positioning data
privacy. Finally, we propose a vision on the development and standardization aspects of such systems.
1. Introduction
Today, the technology is penetrating most of the modern digital systems [1]. Billions of
interconnected devices are already deployed, and many would join them soon in the race towards
smart interconnected world [2]. One of the promising paradigms is the utilization of Intelligent
Transportation Systems (ITS), which is driven by one of the biggest markets being automotive [3].
The technologies covered by ITS are usually split into two major groups: vehicle-to-vehicle (V2V) [4,5]
and vehicle-to-infrastructure (V2I) [6,7]. In an attempt to cover the challenges from both groups, a new
trend called vehicle-to-everything (V2X) [8,9] has recently emerged, focusing on interconnecting cars
with other surrounding objects.
Different standardization communities are already working hard to standardize the technological
requirements, thus aiming for the same goal: to develop a unified ecosystem that would allow reliable,
fast and secure communications between vehicles and roadside infrastructure. Such technologies as
Dedicated Short Range Communications (DSRC) in the USA [10,11] and ETSI ITS-G5 in Europe [12,13]
are actively developing aiming at being deployed in the oncoming decade. Moreover, DSRC has
recently been selected as a V2X communications technology in the USA which means that all the newly
produced cars would be equipped with a wireless IEEE 802.11p module [14] that could also be used
for positioning tasks [15]. Japan is also actively involved in equipping the vehicles with DSRC aiming
to have more than 100,000 operational by 2025 [16].
Previously, V2X development was not so widespread as smart cars were limited in numbers,
highly priced and thus inaccessible to the majority of the world’s population. In this paper, we will
focus only on the vehicular positioning privacy in an urban scenario where a conventional Global
Navigation Satellite System (GNSS) can be affected negatively by propagation in complex environments
issues [17]. Nowadays, this problem becomes exceptionally significant due to the fast development of
vehicle use delegation [18] in the car-sharing business [19,20].
Indeed, GNSSs proved themselves to be inefficient in urban-canyon operation scenario [21]
also known as multipath interference phenomenon, caused by tall buildings blocking lines
of sight (LOS) from the receiver to the navigation satellites. Some works have proven that
no-line-of-sight (NLOS) signals could still be used for positioning if longer integration times and
data wipe-off are present [22,23].
Many solutions were proposed to mitigate the challenges of efficient vehicle location
determination. Simultaneously, operation in the city allows broad communication possibilities
due to high coverage of various wireless technologies including conventional cellular and other
heterogeneous techniques [24,25].
Overall, several radio-ranging-based cooperative positioning (CP) techniques were already
proposed to enable vehicular localization in urban environment [26]. Nonetheless, the localization
problem in conventional Mobile ad hoc networks (MANETs) with range measurements is often tackled
by trilateration and multilateration to some fixed or mobile anchor nodes [27].
The internode distance is commonly measured using radio-ranging or range-rating techniques
such as the time of arrival (TOA), time difference of arrival (TDOA), received signal strength (RSS),
and other techniques [28]. The infrastructure in ITS provides the nodes not only with precise positions
on the trusted infrastructure units but could also deliver regularly updated maps of the RSS based on
the devices involved. Despite common V2I infrastructure nodes, the development of cellular networks
beyond 5G would allow more precise positioning by utilizing specific synchronization signals with 5G
New Radio (5G NR) even under high mobility constrains [29].
Since vehicular positioning mostly relies on the data provided by the Location Solution
Provider (LSP), many concerns arise in regard to controlling personal information of the user [30].
Potential misuse of such sensitive data by LSP while user blindly agrees to the terms of use or even
unauthorized tracking of the vehicle may occur when relying on the ITS positioning techniques. Note,
that such situations appear even today and many security-related questions of said networks are still
open [31]. For example, U.S.-based LocationSmart company was leaking the sensitive information
about the positions of the smartphones operating under various cellular operators [32]. A similar
case was reported earlier the same month by The New York Times, the service initially used to
monitor calls from inmates and allowing to find almost any cell phone in the U.S. in seconds was
misused [33]. Note, it is possible to uniquely identify the node based on just four hours of the
monitoring while having access to the position-related data provider in 95% cases [34] based on said
digital activity ‘footprints’ [35].
From the V2X positioning perspective, researchers have proposed a considerable number of
privacy-preserving protocols for data exchange between the vehicle and the surrounding nodes [36].
Most of these protocols imply authentication of the vehicle to the trusted anchor nodes [37]. However,
Sensors 2019, 19, 1603 3 of 23
protocols without mutual authentication may be vulnerable to a wide range of attacks that should be
carefully taken into consideration during the system development phase. The main contributions of
this paper can be listed as:
The rest of the paper is organized as follows. First, we survey the existing solutions for vehicular
localization in Section 2. Next, we provide an overview of the protocols that utilize additional data
from the environment/user to assist in locating the vehicle in Section 3. Further, we propose a simple
extension to said protocols in Sections 3 and 4. Next, we elaborate on potential attacks on proposed
architecture in Section 5. The last section provides future perspectives concerning standardization
aspects and concludes the paper.
GNSS
DSRC
Node-centric Human-centric
The second GNSS giant is the Russian Global Navigation Satellite System (GLONASS) which
serves the same role despite some minor differences [41]. GLONASS satellite orbits are arrayed in three
planes, separated from one another in right ascension of ascending node by 120 degrees, with eight
satellites in each plane. The number of spacecraft is 26 including 24 actively operational ones (as of
March, 2019), and the altitude is 19,100 km (11,868 miles) [42].
Finally, GNSS positioning technology widely used in the European Union is GALILEO starting
2005 [43]. GALILEO system currently has 26 operational satellites on the orbit placed in 3 orbital
planes, at 29,600 km (18,400 miles) altitude [44]. Worth to note, the GNSS system specifically utilized
in China–BeiDou Navigation Satellite System (BDS). BDS constellation currently has 17 operational
satellites, and the number is expected to reach 35 by 2020 [45]. Nonetheless, most of the mass-produced
vehicles are already equipped with both GPS and GLONASS systems [46].
The fundamental principle of using the GNSS system is to determine the location by measuring
the timing of the reception of a synchronized signal from the navigation satellites [47,48]. Despite
almost-the-entire-globe coverage, GNSS has a number of challenges that could not be neglected.
To start with, the material penetration characteristics limit the use of GNSS in hard-reach places
such as underground parking, tunnels, etc. Next, because of the near-spherical shape of the Earth
calculating an accurate distance between two points requires the use of spherical geometry and
trigonometric math functions. However, many applications calculate an approximate distance using
simplified ones. Thus, the GNSS-based calculation of the distance between two objects can lead to
errors of 10 percent or more [49]. The most significant issue of the GNSS is its propagation in urban
environments where multipath fading has a tremendously adverse effect on the position estimation.
would allow for packing hundreds of antenna elements in a small area, enabling the implementation
of highly directional beamforming capabilities, thus providing better spatial reuse and, consequently,
better positioning [57]. In particular, it is achieved by utilizing massive Multiple Input Multiple
Output (MIMO) technique [58]. 5G positioning for vehicular networks represents its separate niche or
interest [59]. 5G NR is generally expected to provide an accurate positioning from a single reference
base station (BS) also form multipath components of up to 0.5 m [60], which is especially beneficial for
V2I scenarios.
in [63,77]. This method requires to install a set of base stations controlled by a central authority,
for example, a cellular or Low-Power Wide-Area Wireless Technology (LPWA) operator. If the base
stations can uniquely compute the vehicle location using these distance bounds, and if this location
falls into the triangular pyramid formed between the verifiers, then they conclude that the vehicle
location is correct. Equivalently, only three verifiers are needed to define the vehicle location in two
dimensions; the verifiers still consider the location correct if it can be uniquely computed and if it falls
in the triangle formed between them [63].
This approach poses a number of problems, namely:
• Simultaneous reception: In this method, the vehicle communicates with at least three base stations
in order to obtain its current coordinates. Certainly, in the real world, it is impossible to get three
signals perfectly synchronized.
• Security: In the communication process, it is vital not to allow the attacker to receive the
transmitted data. In [78,79] the potential cyber-attacks specific to automated vehicles are
investigated. Therefore, it is necessary to provide a secure transfer of information between
the station and the vehicle.
• Confidence or trustability of the access nodes: Before transmitting the information, it is required
to ensure that the base station is trustworthy valid by employing mutual authentication. Some of
the approaches to mutual authentication were described in [80,81]. This problem could also be
addressed with conventional role-based models [82].
• Anonymity: In some situations, the base station is not supposed to obtain any information about
the vehicle, neither the identification nor the location. In this paper, we show several protocols
fulfilling mobile node anonymity requirement.
RSSIs, BSIDs
Approximate location
Verify if location in
permissible norm
Updated map and location
In this section, we consider possible protocols for data exchange between a vehicle not possessing
reliable location information and its surrounding roadside elements and other traffic participants
carrying location data. The crucial feature of these protocols is the presence or absence of anonymity
of the vehicle requesting location information. The anonymity of the request for location is an
essential property of the protocol, and its availability requires significant complication of the protocol.
The anonymity in this work is considered as the process of ‘hiding’ the actual vehicle location.
Generally, the localization process could be viewed as follows.
• First, the ‘indirect’ distance to the static trusted nodes obtained from the known units (cellular or
infrastructure units) is estimated. Mutual authentication also takes place during this phase.
• Next, the distances are utilized to estimate the location of the node through classical geometry by,
for example, triangulation.
We further list the potential options for securely executing the first phase.
Construct Description
V Target vehicle
S Target base station
NV , NV0 , NS Random nonces
h( x ) Hashing function
id x Unique identification number
KVS Pairwise symmetric key
sigKVS ( x ) Signature by KVS
dVS Distance between nodes
tVS Time between message exchange
σ Delay in response to the base station
tVS Miscalculated time of passing the signal
F(x) Homomorphic transformation
Sensors 2019, 19, 1603 8 of 23
Ns⊕Nv
First, a shared symmetric key must be generated between the vehicle and the infrastructure node
for secure exchange of information. Key generation algorithm depends on the computing power
modules installed in the vehicle and base station. Now, it is presumed that such a link has already
been established and the data exchange between the station and the vehicle takes place via the secure
medium. It is also presumed that a shared symmetric key was delivered after the devices have
established a secure link employing, for example, the well-known Diffie-Hellmann protocol. Thus,
common pairwise key KVS could be utilized for the message authentication for both vehicle and BS.
Basically, we state that correct deciphering of e = EKVS (m) and obtaining m is only feasible for the
vehicle and the BS.
The first step of the protocol for determining the distance between the base station and the vehicle
is the generation of two random nonces (NV , NV0 ). Next, it in necessary to calculate their hash function
h (commit) on the vehicle side and to send the result to the infrastructure. In turn, the BS generates one
nonce (NS ) and sends it to V. The vehicle must calculate NS ⊕ NV and return it.
The key point of the protocol is that S measures the time between sending NS and receiving
NS ⊕ NV . Using this time, the infrastructure can estimate the distance dVS to the vehicle. After that,
V communicates with the base station, sending the identification number id, NV0 and the signature
of id and NV0 , using their pairwise symmetric key KVS . Base station S verifies if the signature and
commit = h( NV , NV0 ) are correct. If all checks are correct, the base station considers the distance dVS
computed at the previous step to be reliable. Further, the received value dVS can either be sent to the
vehicle or used on a dedicated server to calculate the vehicle’s location.
In 2006, this protocol was improved in [63], further referred as P-06 protocol. The modified
strategy is shown in Figure 4. In this improved version of the protocol, only the last two steps were
modified. V sends encrypted information, its id number, NS and NV0 with the symmetric key KVS .
S decrypts the message and verifies if commit = h( NV , NV0 ).
Sensors 2019, 19, 1603 9 of 23
Generate
random Nv, Nv',
commit = h(Nv, Nv')
V, commit
Ns⊕Nv
Carrying out a XOR operation imposes extra computational cost; to address this problem,
we propose to modify the protocol slightly. Proposed modification is shown in Figure 5 and
detailed in [87].
This modification eliminates the necessity for XOR calculation. Should both the vehicle and the
infrastructure node require to determine vehicle location, an extra step can be added to the protocol,
namely, as S → V : EKVS (tVS , NV ).
Generate random Nv,
commit = h(Nv)
EKvs(V, Nv)
commit
The above-listed protocols assume that the vehicle is a location-unaware data transmission
initiator. We note that discussed protocols suggest vehicle authentication via Public Key Infrastructure,
Sensors 2019, 19, 1603 10 of 23
while mutual authentication is not present. The protocols should be improved to allow mutual
authentication since a malicious BS attack could be executed, thus compromising the localization
process. We propose our improvement in the next section.
Generate random Nv,
commitV = h(Nv)
EKvs(idV, Nv)
commitV
In the previous section, we discussed the protocols for vehicle-to-base station communication by
transferring the corresponding vehicle id and location, yet this approach is vulnerable to a number
of security issues. An attacker controlling a malicious BS could gain access to the localization of any
vehicle, control its movement, or deceive the vehicle by transmitting the wrong distance, which might
lead to unpleasant consequences. Security of such a protocol might be significantly improved by not
allowing the base station access to precise vehicle location. There are two possible ways of delivering
this improvement:
• The distance is calculated on the side of the vehicle, all the operations are performed in a special
secure computing module;
• The distance is calculated on the side of the base station, while the vehicle actions are limited to
sending requests and receiving answers.
nonce
Random waiting
time interval δ
commitV
Verify if
commitV= h(Nv)
EKvs(tvs ,Nv)
Verify if NV=NV
Calculate a distance
using a real time
Figure 7. A distance-bounding P-AF-V protocol with the property of anonymity (calculations are made
on the vehicle side).
After receiving the message nonce from the base station, the vehicle chooses a random number δ,
which determines the delay in response to the base station, waits for this time interval and sends a
commitment message to the base station afterwards. Thus, the base station does not know the random
delay time chosen by the vehicle and, therefore, does not have an ability to determine the real time tVS
of the signal passing to the vehicle and back.
Accordingly, the station transmits its miscalculated time of passing the signal tVS = tVS + δ to the
vehicle, which can, in turn, calculate the real time of the signal passing through it tVS = tVS − δ. It is
worth noting that the vehicle must quickly obtain information from at least three different stations,
calculate the distance to a particular station, and then calculate the coordinates.
4.2. Protocols of the Distance Determination Which Have the Property of Anonymity
Now, we will consider the protocol where the calculation is carried out at the station side.
The corresponding protocol is shown in Figure 8.
Sensors 2019, 19, 1603 12 of 23
nonce
Waiting time
interval equal δ
commit
Calculate a homomorphic
transformation for tvs: F(tvs)
F(tvs)
Calculate dvs=F-1(F(dvs))
Figure 8. A distance-bounding P-AF-BS protocol with the property of anonymity (calculations are
made on the base station side).
In this protocol, we use a fully homomorphic encryption (FHE) [88]. This technique is detailed
in [89,90]. We repeat all the steps (excluding the last one) from the protocol of vehicle-side distance
calculation, shifting this calculation to the side of the base station. Further, sending the result of the
homomorphic transformation F (tVS ) to the base station, where the distance to the vehicle is calculated,
or using the information received from other stations, its location is determined, the value F (dVS )
or the result of a homomorphic transformation of the coordinates of the car. After this, the received
information is delivered to the vehicle. The use of a homomorphic transformation obfuscates the
true values of tVS from the base station, and the vehicle determines the true value of the distance to
a particular station or its location in this case. This allows for avoiding complex calculations at the
vehicle side, shifting the calculation workload to the BS side.
Here, we compare the discussed protocols and also elaborate on the improved one. Further
on, n—is a message length; λ—the system security parameter. Let’s consider our protocols
and estimate three factors: number of operations, the storage space, and the complexity of
the calculations as: Random number generation—O(1); Transmission—O(1); Hashing, Encryption
Sensors 2019, 19, 1603 13 of 23
6
Random number generation
Hash-function calculation
5 Encryption / Decryption / Signature
Number of operations
Transmission
4
0
P-04 P-06 P-06M P-AF-BS P-AF-V
between two vehicles or between a vehicle and the terrestrial infrastructure used for positioning, such
as cellular signaling [96]. Increasing the security and authentication of the data signaling protocols is
one solution to mitigate this attack type.
Replay attack: This attack is similar to the previous one. Here, the attacker can replay the
messages traveling between vehicles or vehicles and infrastructure thus affecting the correctness
of the positioning itself instead [97].
Sybil Node (Rogue AP): This attack and hardware/software unauthorized modifications are another
active attacks, where BS or AP would transmit intentionally erroneous positioning-related data [98].
To cope with this attack type, outlier detection mechanisms need to be used [99].
Jamming attack: The attacker can be either a stationary or a moving jammer. Given the nature
of the mobility of the vehicular networks, it is rational to have a moving jammer that tracks the
desired node and causes regular interference. Utilizing spread spectrum techniques could assist
in addressing this attack. As one of the options, the Frequency Hopping Spread Spectrum (FHSS)
makes the incoherent signal period impulse-noise to the eavesdroppers. On the other hand, Direct
Sequence Spread Spectrum (DSSS) symbolizes each data bit in the original signal by multiple bits in
the transmitted signal [100] which is also a recommended technique to resist jamming.
Passive Eavesdropping attack: In this type of passive attack, an attacker can listen to the positioning
signaling between two vehicles or between a vehicle and the infrastructure [101]. If the positioning
signaling channel is strongly encrypted – this type of attack may be mitigated.
Message modification attack: This attack is targeted at altering the message during or after
transmission (active attack) [102]. The adversary may wish to change the source or content of the
message in terms of the position or time information that had been sent and saved in its device, in
order to escape the consequences of a criminal/car accident event.
Key and/or Certificate Replication: This attack involves the system endorsement with a node of
similar identity. The execution of the attack relies on the key management or certificates replacement,
in order to forbid the identification and abuse the authorities [103].
While most of the security threats could be mitigated by employing the integration of stronger
information security systems, privacy-related attacks could not be overcome by mere modifying the
hardware/software side of the system.
Attacks Related to Distributed Operation
Congestion attacks: Generally, urban traffic congestion is considered as one of the major problems
from the vehicular systems’ operation perspective. Modern cars are already available to report
the congestion-related data either with integrated wireless modules or via hand-held user devices.
Focusing on the first case, Vehicular Ad-Hoc Networks (VANETs) can provide timely information to
the surrounding nodes which result in more effective route selection (around a sudden traffic jam)
using the information obtained from other cars. From the information security perspective, the V2V
radio connectivity of autonomous vehicles will offer attackers opportunities to combine multiple
compromised vehicles into botnets of cars, which will lead to other serious security consequences [104].
From the infrastructure perspective, such attacks may potentially lead to incorrect traffic light
signaling. As a result, the optimization algorithm running in the ITS cloud may operate based on the
incorrect data, leading to congestion [95].
Repudiation attacks: This attack is an example of adequately tracking and recording the user actions,
which can maliciously manipulate or fake the identification of new nodes [105]. This attack is used to
modify the user’s information about the actions performed by the malicious and to register false data in
log files. It can also be used to manipulate the master data in a similar pattern involving the messages.
If this attack takes place, the data stored in the log files may be considered invalid or misleading.
Sensors 2019, 19, 1603 15 of 23
Routing Loop Attack: In this type of attack, an internal attacker receives a message, updates it and
sends it back to one of the previous forwarders (or the source) even if there is a better node in its routing
table that is available to be the next forwarder according to the routing strategy. This attack aims to
delay or prevent the delivery of a message [106]. The primary countermeasure against routing-related
attacks is by utilizing Intruder Detection techniques and excluding the node from the network [107].
Sinkhole Attack: In this type of routing attack, the attacker (already being in the system,
i.e., an internal one) attempts to announce the nodes in the network with a different location in
its beacon messages followed by drops of any other packets [108]. It results in the poisoning of the
routing tables and packet loss. The attacker may also be intellectual and analyze the captured packets
while conventional one just affects the overall system operation in a harmful way.
Wormhole Attack: This type of routing attack corresponds to cases of two terminals having a link
in between and they resend messages received by one of them to another [109]. Therefore, they can
dominate on the routing path by replaying the valid beacons from other nodes. Attackers tend to
dominate the connection so they can eavesdrop or share the network.
Author Contributions: Conceptualization, S.B., V.D., P.M. and A.S.; methodology, S.B. and V.D.; software, V.D.;
validation, A.O., P.M. and A.S.; formal analysis, E.S.L.; investigation, A.S.; resources, A.O.; writing—original
draft preparation, S.B. and V.D.; writing—review and editing, A.O., A.S., P.M. and E.S.L.; visualization, A.O.;
supervision, S.B., E.S.L. and Y.K.; project administration, S.B. and A.O.; funding acquisition, S.B., E.S.L. and Y.K.
Funding: This work was supported by the Academy of Finland (project #313039—PRISMA) and the work of the
second author is supported by the Academy of Finland under a personal grant. The described research was also
supported by the National Sustainability Program under grant LO1401. The described research was partially
financed by the Ministry of Industry and Trade of Czech Republic project No. FV20487.
Acknowledgments: For the research, the infrastructure of the SIX Center was used.
Conflicts of Interest: The authors declare no conflict of interest. The funders had no role in the design of the
study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to
publish the results.
Sensors 2019, 19, 1603 17 of 23
Abbreviations
The following abbreviations are used in this manuscript:
References
1. Aijaz, A.; Dohler, M.; Aghvami, A.H.; Friderikos, V.; Frodigh, M. Realizing the Tactile Internet: Haptic
Communications over Next Generation 5G Cellular Networks. IEEE Wirel. Commun. 2017, 24, 82–89.
[CrossRef]
2. Cisco. Visual Networking Index: Global Mobile Data Traffic Forecast Update 2017–2022. 2019. Available
online: https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-
vni/white-paper-c11-738429.html (accessed on 1 April 2019).
3. Menouar, H.; Guvenc, I.; Akkaya, K.; Uluagac, A.S.; Kadri, A.; Tuncer, A. UAV-enabled Intelligent
Transportation Systems for the Smart City: Applications and Challenges. IEEE Commun. Mag. 2017,
55, 22–28. [CrossRef]
Sensors 2019, 19, 1603 18 of 23
4. Lin, D.; Kang, J.; Squicciarini, A.; Wu, Y.; Gurung, S.; Tonguz, O. MoZo: A Moving Zone Based Routing
Protocol Using Pure V2V Communication in VANETs. IEEE Trans. Mob. Comput. 2017, 16, 1357–1370.
[CrossRef]
5. Vinel, A.; Lyamin, N.; Isachenkov, P. Modeling of V2V Communications for C-ITS Safety Applications: A
CPS Perspective. IEEE Commun. Lett. 2018, 22, 1600–1603. [CrossRef]
6. Zhang, F.; Xi, J.; Langari, R. Real-time Energy Management Strategy Based on Velocity Forecasts Using V2V
and V2I Communications. IEEE Trans. Intell. Transp. Syst. 2017, 18, 416–430. [CrossRef]
7. Dey, K.C.; Rayamajhi, A.; Chowdhury, M.; Bhavsar, P.; Martin, J. Vehicle-to-Vehicle (V2V) and
Vehicle-to-Infrastructure (V2I) Communication in a Heterogeneous Wireless Network–Performance
Evaluation. Transp. Res. Part C Emerg. Technol. 2016, 68, 168–184. [CrossRef]
8. Lee, K.; Kim, J.; Park, Y.; Wang, H.; Hong, D. Latency of Cellular-based V2X: Perspectives on TTI-Proportional
Latency and TTI-Independent Latency. IEEE Access 2017, 5, 15800–15809. [CrossRef]
9. Seo, H.; Lee, K.D.; Yasukawa, S.; Peng, Y.; Sartori, P. LTE Evolution for Vehicle-to-Everything Services.
IEEE Commun. Mag. 2016, 54, 22–28. [CrossRef]
10. Wang, Y.; Duan, X.; Tian, D.; Chen, M.; Zhang, X. A DSRC-Based Vehicular Positioning Enhancement Using
a Distributed Multiple-Model Kalman Filter. IEEE Access 2016, 4, 8338–8350. [CrossRef]
11. Abboud, K.; Omar, H.A.; Zhuang, W. Interworking of DSRC and Cellular Network Technologies for V2X
Communications: A Survey. IEEE Trans. Veh. Technol. 2016, 65, 9457–9470. [CrossRef]
12. ETSI. Intelligent Transport Systems (ITS); Access Layer Specification for Intelligent Transport Systems Operating in
the 5 GHz Frequency Band; Draft ETSI EN 302 663 V1.2.0; ETSI: Valbonne, France, 2012.
13. Deinlein, T.; German, R.; Djanatliev, A. Evaluation of Single-Hop Beaconing with Congestion Control in
IEEE WAVE and ETSI ITS-G5. In Proceedings of the International Conference on Measurement, Modelling
and Evaluation of Computing Systems, Erlangen, Germany, 26–28 February 2018; pp. 273–282.
14. FierceWireless. DSRC Mandate Moving off the Table for Automakers. 2017. Available online: https:
//www.fiercewireless.com/wireless/report-dsrc-mandate-moving-off-table-for-auto-makers (accessed on
1 April 2019).
15. Li, J.; Cui, X.; Li, Z.; Liu, J. Method to Improve the Positioning Accuracy of Vehicular Nodes Using IEEE
802.11p Protocol. IEEE Access 2018, 6, 2834–2843. [CrossRef]
16. Engadget. Most of Toyota’s Cars Will Talk to Each Other by 2025. 2017. Available online: https://www.
engadget.com/2018/04/16/toyota-vehicle-to-vehicle-communications/ (accessed on 1 April 2019).
17. Wang, L.; Groves, P.D.; Ziebart, M.K. Multi-Constellation GNSS Performance Evaluation for Urban Canyons
Using Large Virtual Reality City Models. J. Navig. 2012, 65, 459–476. [CrossRef]
18. Ometov, A.; Bezzateev, S.; Kannisto, J.; Harju, J.; Andreev, S.; Koucheryavy, Y. Facilitating the Delegation of
Use for Private Devices in the Era of the Internet of Wearable Things. IEEE Internet Things J. 2017, 4, 843–854.
[CrossRef]
19. Bardhi, F.; Eckhardt, G.M. Access-based Consumption: The Case of Car Sharing. J. Consum. Res. 2012,
39, 881–898. [CrossRef]
20. Dmitrienko, A.; Plappert, C. Secure Free-floating Car Sharing for Offline Cars. In Proceedings of the 7th
ACM on Conference on Data and Application Security and Privacy, Scottsdale, AZ, USA, 22–24 March 2017;
pp. 349–360.
21. Cui, Y.; Ge, S.S. Autonomous Vehicle Positioning with GPS in Urban Canyon Environments. IEEE Trans.
Robot. Autom. 2003, 19, 15–25.
22. Wang, L.; Groves, P.D.; Ziebart, M.K. Shadow Matching: Improving Smartphone GNSS Positioning in Urban
Environments. In China Satellite Navigation Conference (CSNC); Springer: Berlin/Heidelberg, Germany, 2013;
pp. 613–621.
23. Douglas, I.J. Improving GPS Global Navigation Accuracy for Connected Vehicles in an Urban Canyon.
Ph.D. Thesis, University of Windsor, Windsor, ON, Canada, 2016.
24. del Peral-Rosado, J.; Saloranta, J.; Destino, G.; López-Salcedo, J.; Seco-Granados, G. Methodology for
Simulating 5G and GNSS High-Accuracy Positioning. Sensors 2018, 18, 3220. [CrossRef] [PubMed]
25. Kumar, D.; Saloranta, J.; Kaleva, J.; Destino, G.; Tölli, A. Reliable Positioning and mmWave Communication
via Multi-Point Connectivity. Sensors 2018, 18, 4001. [CrossRef]
26. Soatti, G.; Nicoli, M.; Garcia, N.; Denis, B.; Raulefs, R.; Wymeersch, H. Implicit Cooperative Positioning in
Vehicular Networks. arXiv 2017, arXiv:1709.01282.
Sensors 2019, 19, 1603 19 of 23
27. Han, G.; Jiang, J.; Zhang, C.; Duong, T.Q.; Guizani, M.; Karagiannidis, G.K. A Survey on Mobile Anchor
Node Assisted Localization in Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2016, 18, 2220–2243.
[CrossRef]
28. Mahmoud, A.; Noureldin, A.; Hassanein, H.S. VANETs Positioning in Urban Environments: A Novel
Cooperative Approach. In Proceedings of the 82nd Vehicular Technology Conference (VTC Fall),
Boston, MA, USA, 6–9 September 2015; pp. 1–7.
29. Talvitie, J.; Levanen, T.; Koivisto, M.; Pajukoski, K.; Renfors, M.; Valkama, M. Positioning of High-speed
Trains Using 5G New Radio Synchronization Signals. arXiv 2018, arXiv:1805.01830.
30. Lohan, E.S.; Alén-Savikko, A.; Chen, L.; Järvinen, K.; Leppäkoski, H.; Kuusniemi, H.; Korpisaari, P.
5G Positioning: Security and Privacy Aspects. In A Comprehensive Guide to 5G Security; John Wiley & Sons Ltd.:
Hoboken, NJ, USA, 2018; p. 281.
31. Kalinin, M.; Krundyshev, V.; Zegzhda, P.; Belenko, V. Network Security Architectures for VANET.
In Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur,
India, 13–15 October 2017; pp. 73–79.
32. WIRED Media Group. Website Leaked Real-time Location of Most US Cell Phones to Almost Anyone. 2018.
Available online: https://arstechnica.com/information-technology/2018/05/service-leaked-locations-of-
us-cell-phones-for-free-no-password-required/ (accessed on 1 April 2019).
33. The New York Times. Service Meant to Monitor Inmates’ Calls Could Track You, Too. 2018. Available online:
https://www.nytimes.com/2018/05/10/technology/cellphone-tracking-law-enforcement.html (accessed on
1 April 2019).
34. De Montjoye, Y.A.; Hidalgo, C.A.; Verleysen, M.; Blondel, V.D. Unique in the Crowd: The Privacy Bounds of
Human Mobility. Sci. Rep. 2013, 3, 1376. [CrossRef] [PubMed]
35. NBCUniversal Media. Your Phone May Be Tracking Your Every Move. 2017. Available online: https://www.
nbclosangeles.com/news/local/Smartphone-Location-Tracking-423054644.html (accessed on 1 April 2019).
36. Sui, P.; Li, X.; Bai, Y. A Study of Enhancing Privacy for Intelligent Transportation Systems: k-Correlation
Privacy Model Against Moving Preference Attacks for Location Trajectory Data. IEEE Access 2017,
5, 24555–24567. [CrossRef]
37. Chen, C.L.; Chiang, M.L.; Peng, C.C.; Chang, C.H.; Sui, Q.R. A Secure Mutual Authentication Scheme with
Non-Repudiation for Vehicular Ad Hoc Networks. Int. J. Commun. Syst. 2017, 30, e3081. [CrossRef]
38. Liu, K.; Lim, H.B.; Frazzoli, E.; Ji, H.; Lee, V.C. Improving positioning accuracy using GPS pseudorange
measurements for cooperative vehicular localization. IEEE Trans. Veh. Technol. 2014, 63, 2544–2556.
[CrossRef]
39. Hegarty, C.J. The Global Positioning System (GPS). In Springer Handbook of Global Navigation Satellite Systems;
Springer: Cham, Switzerland, 2017; pp. 197–218.
40. U.S. Coast Guard Navigation Center. GPS Contallation Status. 2019. Available online: https://www.navcen.
uscg.gov/?Do=constellationStatus (accessed on 1 April 2019).
41. Li, X.; Ge, M.; Dai, X.; Ren, X.; Fritsche, M.; Wickert, J.; Schuh, H. Accuracy and Reliability of Multi-GNSS
Real-time Precise Positioning: GPS, GLONASS, BeiDou, and Galileo. J. Geod. 2015, 89, 607–635. [CrossRef]
42. Information and Analysis Center for Positioning, Navigation and Timing. GLONASS contallation Status.
2019. Available online: https://www.glonass-iac.ru/en/GLONASS/ (accessed on 1 April 2019).
43. Nurmi, J.; Lohan, E.S.; Sand, S.; Hurskainen, H. GALILEO Positioning Technology; Springer: Dordrecht,
The Netherlands, 2015; Volume 176.
44. European GNSS Service Center. GALILEO Contallation Status. 2019. Available online: https://www.gsc-
europa.eu/system-status/orbital-and-technical-parameters (accessed on 1 April 2019).
45. Sun, F.; Liu, S.; Zhu, X.; Men, B. Research and Progress of Beidou Satellite Navigation System. Sci. China
Inf. Sci. 2012, 55, 2899–2907. [CrossRef]
46. Angrisano, A.; Gaglione, S.; Gioia, C. Performance Assessment of GPS/GLONASS Single Point Positioning
in an Urban Environment. Acta Geod. Geophys. 2013, 48, 149–161. [CrossRef]
47. Renfro, B.A.; Terry, A.; Boeker, N. An Analysis of Global Positioning System (GPS) Standard Positioning
System (SPS) Performance for 2015; Technical Report; Space and Geophysics Laboratory, Applied Research
Laboratories, The University of Texas at Austin: Austin, TX, USA, 2017.
48. Specht, C.; Mania, M.; Skóra, M.; Specht, M. Accuracy of the GPS Positioning System in the Context of
Increasing the Number of Satellites in the Constellation. Polish Marit. Res. 2015, 22, 9–14. [CrossRef]
Sensors 2019, 19, 1603 20 of 23
49. Meridian World Data, Inc. Distance Calculation. 2018. Available online: http://www.meridianworlddata.
com/distance-calculation/ (accessed on 1 April 2019).
50. Laitinen, E.; Lohan, E.S.; Talvitie, J.; Shrestha, S. Access Point Significance Measures in WLAN-based
Location. In Proceedings of the 9th Workshop on Positioning Navigation and Communication (WPNC),
Dresden, Germany, 15–16 March 2012; pp. 24–29.
51. Ma, S.; Lee, H.; Cheng, H. A Positioning Accuracy Enhancement Method Based on Inter-Vehicular
Communication and Self-Organizing Map. In Proceedings of the International Conference on Information
and Communication Technology Convergence (ICTC), Jeju, Korea, 17–19 October 2018; pp. 748–753.
52. Llorca, D.F.; Quintero, R.; Parra, I.; Sotelo, M. Recognizing Individuals in Groups in Outdoor Environments
Combining Stereo Vision, RFID and BLE. Clust. Comput. 2017, 20, 769–779. [CrossRef]
53. Lei, Y.; Wang, T.; Wu, J. Vehicles Relative Positioning Based on ZigBee and GPS Technology. In Proceedings
of the 6th International Conference on Electronics Information and Emergency Communication (ICEIEC),
Beijing, China, 17–19 June 2016; pp. 59–62.
54. Sivers, M.; Fokin, G. LTE Positioning Accuracy Performance Evaluation. In Proceedings of the Conference
on Smart Spaces, St. Petersburg, Russia, 26–28 August 2015; pp. 393–406.
55. Koivisto, M.; Costa, M.; Hakkarainen, A.; Leppanen, K.; Valkama, M. Joint 3D Positioning and Network
Synchronization in 5G Ultra-Dense Networks Using UKF and EKF. In Proceedings of the Globecom
Workshops (GC Wkshps), Washington, DC, USA, 4–8 December 2016; pp. 1–7.
56. Halvarsson, B.; Simonsson, A.; Elgcrona, A.; Chana, R.; Machado, P.; Asplund, H. 5G NR Testbed 3.5 GHz
Coverage Results. In Proceedings of the 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal,
3–6 June 2018; pp. 1–5.
57. Rastorgueva-Foi, E.; Costa, M.; Koivisto, M.; Leppänen, K.; Valkama, M. User Positioning in mmW 5G
Networks using Beam-RSRP Measurements and Kalman Filtering. arXiv 2018, arXiv:1803.09478.
58. Liu, Y.; Shi, X.; He, S.; Shi, Z. Prospective Positioning Architecture and Technologies in 5G Networks.
IEEE Netw. 2017, 31, 115–121. [CrossRef]
59. Wymeersch, H.; Seco-Granados, G.; Destino, G.; Dardari, D.; Tufvesson, F. 5G mmWave Positioning for
Vehicular Networks. IEEE Wirel. Commun. 2017, 24, 80–86. [CrossRef]
60. Wymeersch, H.; Garcia, N.; Kim, H.; Seco-Granados, G.; Kim, S.; Went, F.; Fröhle, M. 5G mm Wave Downlink
Vehicular Positioning. In Proceedings of the Global Communications Conference (GLOBECOM), Abu Dhabi,
United Arab Emirates, 9–13 December 2018, pp. 206–212.
61. Kang, J.; Yu, R.; Huang, X.; Zhang, Y. Privacy-Preserved Pseudonym Scheme for Fog Computing Supported
Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2018, 19, 2627–2637. [CrossRef]
62. Parker, R.; Valaee, S. Vehicle Localization in Vehicular Networks. In Proceedings of the 64th Vehicular
Technology Conference (VTC), Montreal, QC, Canada, 25–28 September 2006; pp. 1–5.
63. Capkun, S.; Hubaux, J.P. Secure Positioning of Wireless Devices with Application to Sensor Networks.
In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies,
Miami, FL, USA, 13–17 March 2005; Volume 3, pp. 1917–1928.
64. Johnson, D.B.; Maltz, D.A. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing;
Springer: Boston, MA, USA, 1996; pp. 153–181.
65. Kato, S.; Tsugawa, S.; Tokuda, K.; Matsui, T.; Fujii, H. Vehicle Control Algorithms for Cooperative Driving
with Automated Vehicles and Intervehicle Communications. IEEE Trans. Intell. Transp. Syst. 2002, 3, 155–161.
[CrossRef]
66. Clark, S.; Durrant-Whyte, H. Autonomous Land Vehicle Navigation Using Millimeter Wave Radar.
In Proceedings of the International Conference on Robotics and Automation, Leuven, Belgium,
16–20 May 1998; Volume 4, pp. 3697–3702.
67. Yoneda, K.; Hashimoto, N.; Yanase, R.; Aldibaja, M.; Suganuma, N. Vehicle Localization Using 76GHz
Omnidirectional Millimeter-Wave Radar for Winter Automated Driving. In Proceedings of the Intelligent
Vehicles Symposium (IV), Changshu, China, 26–30 June 2018; pp. 971–977.
68. Sánchez-Carmona, A.; Robles, S.; Borrego, C. PrivHab+: A Secure Geographic Routing Protocol for DTN.
Comput. Commun. 2016, 78, 56–73. [CrossRef]
69. Bou Abdo, J.; Bourgeau, T.; Demerjian, J.; Chaouchi, H. Extended Privacy in Crowdsourced Location-based
Services Using Mobile Cloud Computing. Mob. Inf. Syst. 2016, 2016, 7867206. [CrossRef]
Sensors 2019, 19, 1603 21 of 23
70. Ometov, A.; Petrov, V.; Bezzateev, S.; Andreev, S.; Koucheryavy, Y.; Gerla, M. Challenges of Multi-Factor
Authentication for Securing Advanced IoT (A-IoT) Applications. arXiv 2019, arXiv:1901.06977.
71. Cui, X.; Gulliver, T.A.; Song, H.; Li, J. Real-time Positioning Based on Millimeter Wave Device to Device
Communications. IEEE Access 2016, 4, 5520–5530. [CrossRef]
72. Lin, X.; Andrews, J.G.; Ghosh, A.; Ratasuk, R. An Overview of 3GPP Device-to-Device Proximity Services.
IEEE Commun. Mag. 2014, 52, 40–48. [CrossRef]
73. Riener, A.; Ferscha, A. Supporting Implicit Human-to-Vehicle Interaction: Driver Identification from Sitting
Postures. In Proceedings of the 1st Annual International Symposium on Vehicular Computing Systems
(ISVCS), Dublin, Ireland, 22–24 July 2008; p. 10.
74. Lu, Z.; de Winter, J.C. A Review and Framework of Control Authority Transitions in Automated Driving.
Procedia Manuf. 2015, 3, 2510–2517. [CrossRef]
75. Dunbar, J.; Gilbert, J.E. The Human Element in Autonomous Vehicles. In Proceedings of the International
Conference on Engineering Psychology and Cognitive Ergonomics, Vancouver, BC, Canada, 9–14 July 2017;
pp. 339–362.
76. Campos, R.S. Evolution of Positioning Techniques in Cellular Networks, from 2G to 4G. Wirel. Commun.
Mob. Comput. 2017, 2017, 2315036. [CrossRef]
77. Esteves, J.S.; Carvalho, A.; Couto, C. Generalized Geometric Triangulation Algorithm for Mobile Robot
Absolute Self-localization. In Proceedings of the IEEE International Symposium on Industrial Electronics,
Rio de Janeiro, Brazil, 9–11 June 2003; Volume 1, pp. 346–351.
78. Larson, U.E.; Nilsson, D.K. Securing Vehicles Against Cyber Attacks. In Proceedings of the 4th Annual
Workshop on Cyber Security and Information Intelligence Research: Developing Strategies to Meet the
Cyber Security and Information Intelligence Challenges Ahead, Oak Ridge, TN, USA, 12–14 May 2008; p. 30.
79. Petit, J.; Shladover, S.E. Potential Cyberattacks on Automated Vehicles. IEEE Trans. Intell. Transp. Syst. 2015,
16, 546–556. [CrossRef]
80. Dolev, S.; Krzywiecki, Ł.; Panwar, N.; Segal, M. Vehicle Authentication via Monolithically Certified Public
Key and Attributes. Wirel. Netw. 2016, 22, 879–896. [CrossRef]
81. Zhang, C.; Lin, X.; Lu, R.; Ho, P.H. RAISE: An Efficient RSU-aided Message Authentication Scheme in
Vehicular Communication Networks. In Proceedings of the International Conference on Communications,
Beijing, China, 19–23 May 2008; pp. 1451–1457.
82. Kalinin, M.; Krundyshev, V.; Rezedinova, E.; Zegzhda, P. Role-based Access Control for Vehicular adhoc
Networks. In Proceedings of the International Black Sea Conference on Communications and Networking
(BlackSeaCom), Batumi, Georgia, 4–7 June 2018; pp. 1–5.
83. del Peral-Rosado, J.A.; Raulefs, R.; López-Salcedo, J.A.; Seco-Granados, G. Survey of Cellular Mobile Radio
Localization Methods: From 1G to 5G. IEEE Commun. Surv. Tutor. 2018, 20, 1124–1148. [CrossRef]
84. Qian, C.; Xu, H.; Li, P.; Wang, Y. Design and Implementation of Urban Vehicle Positioning System Based
on RFID, GPS and LBS. In Proceedings of the Conference on Complex, Intelligent, and Software Intensive
Systems, Turin, Italy, 10–13 July 2017; pp. 599–608.
85. Rohani, M.; Gingras, D.; Gruyer, D. A Novel Approach for Improved Vehicular Positioning Using
Cooperative Map Matching and Dynamic Base Station DGPS Concept. IEEE Trans. Intell. Transp. Syst. 2016,
17, 230–239. [CrossRef]
86. Hubaux, J.P.; Capkun, S.; Luo, J. The Security and Privacy of Smart Vehicles. IEEE Secur. Priv. 2004, 2, 49–55.
[CrossRef]
87. Davydov, V.; Bezzateev, S. Secure Information Exchange in Defining the Location of the Vehicle.
In Proceedings of the 41st International Conference on Telecommunications and Signal Processing (TSP),
Athens, Greece, 4–6 July 2018; pp. 1–5.
88. Brakerski, Z.; Vaikuntanathan, V. Efficient Fully Homomorphic Encryption from (Standard) LWE. SIAM J.
Comput. 2014, 43, 831–871. [CrossRef]
89. Rohilla, A.; Khurana, M.; Singh, L. Location Privacy using Homomorphic Encryption over Cloud. Int. J.
Comput. Netw. Inf. Secur. 2017, 9, 32. [CrossRef]
90. Alanwar, A.; Shoukry, Y.; Chakraborty, S.; Martin, P.; Tabuada, P.; Srivastava, M. PrOLoc: Resilient
Localization with Private Observers Using Partial Homomorphic Encryption. In Proceedings of the
16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN),
Pittsburgh, PA, USA, 18–21 April 2017; pp. 41–52.
Sensors 2019, 19, 1603 22 of 23
91. Rachmawati, D.; Tarigan, J.; Ginting, A. A Comparative Study of Message Digest 5 (MD5) and SHA256
Algorithm. J. Phys. Conf. Ser. 2018, 978, 012116. [CrossRef]
92. Guerzhoy, M. Complexity of Aarithmetic Operations. 2018. Available online: https://www.cs.toronto.edu/
~guerzhoy/180/lectures/W11/lec1/ComplArithm.html (accessed on 1 April 2019).
93. Montanaro, A.; Osborne, T. On the Communication Complexity of XOR Functions. arXiv 2009,
arXiv:0909.3392.
94. Armknecht, F.; Boyd, C.; Carr, C.; Gjøsteen, K.; Jäschke, A.; Reuter, C.A.; Strand, M. A Guide to Fully
Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2015, 2015, 1192.
95. Ta, V.T.; Dvir, A.; Arie, Y. Securing Road Traffic Congestion Detection by Incorporating V2I Communications.
In Proceedings of the 19th International Symposium on A World of Wireless, Mobile and Multimedia
Networks (WoWMoM), Chania, Greece, 12–15 June 2018; pp. 1–6.
96. Al-Kahtani, M.S. Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs). In Proceedings of
the 6th International Conference on Signal Processing and Communication Systems (ICSPCS), Gold Coast,
QLD, Australia, 12–14 December 2012; pp. 1–9.
97. Capkun, S.; Hubaux, J.P. Secure Positioning in Wireless Networks. IEEE J. Sel. Areas Commun. 2006,
24, 221–232. [CrossRef]
98. Yu, B.; Xu, C.Z.; Xiao, B. Detecting Sybil Attacks in VANETs. J. Parallel Distrib. Comput. 2013, 73, 746–756.
[CrossRef]
99. Li, X.; Li, Z.; Han, J.; Lee, J.G. Temporal Outlier Detection in Vehicle Traffic Data. In Proceedings of the 25th
International Conference on Data Engineering, Shanghai, China, 29 March–2 April 2009; pp. 1319–1322.
100. Mokhtar, B.; Azab, M. Survey on Security Issues in Vehicular Ad Hoc Networks. Alex. Eng. J. 2015,
54, 1115–1126. [CrossRef]
101. Mahajan, S.; Jindal, A. Security and Privacy in VANET to Reduce Authentication Overhead for Rapid
Roaming Networks. Int. J. Comput. Appl. 2010, 1, 21–25. [CrossRef]
102. Lin, X.; Sun, X.; Ho, P.H.; Shen, X. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular
Communications. IEEE Trans. Veh. Technol. 2007, 56, 3442–3456.
103. Zeadally, S.; Hunt, R.; Chen, Y.S.; Irwin, A.; Hassan, A. Vehicular Ad Hoc Networks (VANETS): Status,
Results, and Challenges. Telecommun. Syst. 2012, 50, 217–241. [CrossRef]
104. Garip, M.T.; Gursoy, M.E.; Reiher, P.; Gerla, M. Congestion Attacks to Autonomous Cars Using Vehicular
Botnets. In Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT),
San Diego, CA, USA, 8 February 2015.
105. Smitha, A.; Pai, M.M.; Ajam, N.; Mouzna, J. An Optimized Adaptive Algorithm for Authentication of Safety
Critical Messages in VANET. In Proceedings of the 8th International Conference on Communications and
Networking in China (CHINACOM), Guilin, China, 14–16 August 2013; pp. 149–154.
106. Alsharif, N.; Wasef, A.; Shen, X. Mitigating the Effects of Position-based Routing Attacks in Vehicular Ad
Hoc Networks. In Proceedings of the International Conference on Communications (ICC), Kyoto, Japan,
5–9 June 2011; pp. 1–5.
107. Erritali, M.; El Ouahidi, B. A Review and Classification of Various VANET Intrusion Detection Systems.
In Proceedings of the National Security Days (JNS3), Rabat, Morocco, 26–27 April 2013; pp. 1–6.
108. Sirola, P.; Joshi, A.; Purohit, K.C. An Analytical Study of Routing Attacks in Vehicular Ad-Hoc Networks
(VANETs). Int. J. Comput. Sci. Eng. 2014, 3, 210–218.
109. Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANET Security Challenges and Solutions: A Survey.
Veh. Commun. 2017, 7, 7–20. [CrossRef]
110. Simic, M.N. Vehicular Ad Hoc Networks. In Proceedings of the 11th International Conference
on Telecommunication in Modern Satellite, Cable and Broadcasting Services (TELSIKS), Nis, Serbia,
16–19 October 2013; Volume 2, pp. 613–618.
111. Bloessl, B.; Sommer, C.; Dressier, F.; Eckhoff, D. The Scrambler Attack: A Robust Physical Layer Attack on
Location Privacy in Vehicular Networks. In Proceedings of the International Conference on Computing,
Networking and Communications (ICNC), Garden Grove, CA, USA, 16–19 February 2015; pp. 395–400.
112. Gedik, B.; Liu, L. Protecting Location Privacy with Personalized k-anonymity: Architecture and Algorithms.
IEEE Trans. Mob. Comput. 2008, 7, 1–18. [CrossRef]
113. Artail, H.; Abbani, N. A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc
Networks. IEEE Trans. Dependable Secure Comput. 2016, 13, 106–119. [CrossRef]
Sensors 2019, 19, 1603 23 of 23
114. Gerlach, M.; Guttler, F. Privacy in VANETs Using Changing Pseudonyms-Ideal and Real. In Proceedings of
the 65th Vehicular Technology Conference, Dublin, Ireland, 22–25 April 2007; pp. 2521–2525.
115. Kalinin, M.; Zegzhda, P.; Zegzhda, D.; Vasiliev, Y.; Belenko, V. Software Defined Security for Vehicular ad hoc
Networks. In Proceedings of the International Conference on Information and Communication Technology
Convergence (ICTC), Jeju, Korea, 19–21 Octber 2016; pp. 533–537.
116. Di Maio, A.; Palattella, M.; Soua, R.; Lamorte, L.; Vilajosana, X.; Alonso-Zarate, J.; Engel, T. Enabling SDN in
VANETs: What is the Impact on Security? Sensors 2016, 16, 2077. [CrossRef] [PubMed]
117. European Parliament and Council of the European Union. General Data Protection Regulation (EU) 2016/679
(“GDPR”); EU Regulation; European Parliament and Council of the European Union: Brussels, Belgium, 2018.
118. ETSI. Satellite Earth Stations and Systems (SES); Global Navigation Satellite System (GNSS) Receivers; Radio
Equipment Operating in the 1 164 MHz to 1 300 MHz and 1 559 MHz to 1 610 MHz Frequency Bands; Harmonised
Standard Covering the Essential Requirements of Article 3.2 of Directive 2014/53/EU; Draft ETSI EN 303 413 V1.1.0;
ETSI: Valbonne, France, 2017.
119. Di Taranto, R.; Muppirisetty, L.S.; Raulefs, R.; Slock, D.; Svensson, T.; Wymeersch, H. Location-aware
Communications for 5G Networks. IEEE Signal Process. Mag. 2014, 31, 102–112. [CrossRef]
120. Ahmad, I.; Kumar, T.; Liyanage, M.; Okwuibe, J.; Ylianttila, M.; Gurtov, A. 5G Security: Analysis of Threats
and Solutions. In Proceedings of the Conference on Standards for Communications and Networking (CSCN),
Helsinki, Finland, 18–20 September 2017; pp. 193–199.
121. Huawei. 5G Security: Forward Thinking. 2015. Available online: https://www.huawei.com/minisite/5g/
img/5G_Security_Whitepaper_en.pdf (accessed on 1 April 2019).
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).